Skip to main content

CVE-2025-6797: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Marvell QConvergeConsole

High
VulnerabilityCVE-2025-6797cvecve-2025-6797cwe-22
Published: Mon Jul 07 2025 (07/07/2025, 14:50:45 UTC)
Source: CVE Database V5
Vendor/Project: Marvell
Product: QConvergeConsole

Description

Marvell QConvergeConsole getFileUploadBytes Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the getFileUploadBytes method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-24917.

AI-Powered Analysis

AILast updated: 07/07/2025, 15:13:07 UTC

Technical Analysis

CVE-2025-6797 is a high-severity vulnerability classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory, commonly known as Path Traversal) affecting Marvell's QConvergeConsole product, specifically version 5.5.0.78. The vulnerability resides in the getFileUploadBytes method, where insufficient validation of user-supplied file paths allows an unauthenticated remote attacker to perform directory traversal attacks. By manipulating the file path input, an attacker can access arbitrary files on the system with SYSTEM-level privileges, leading to sensitive information disclosure. Notably, exploitation does not require authentication or user interaction, increasing the risk of automated or widespread attacks. Although no public exploits have been reported yet, the vulnerability's characteristics—network exploitable, no privileges required, and high confidentiality impact—make it a critical concern. The vulnerability was identified and assigned by the Zero Day Initiative (ZDI) as ZDI-CAN-24917 and published on July 7, 2025. The CVSS v3.0 base score is 7.5, reflecting a high severity due to the ease of exploitation and the potential for significant data exposure. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the urgency for affected organizations to implement mitigations and monitor for updates from Marvell.

Potential Impact

For European organizations, the impact of CVE-2025-6797 can be substantial, especially for those using Marvell QConvergeConsole in their network infrastructure or device management environments. The ability for unauthenticated attackers to remotely access sensitive files with SYSTEM privileges threatens the confidentiality of critical data, including configuration files, credentials, and potentially personally identifiable information (PII). This exposure can lead to further compromise, such as lateral movement within networks or preparation for more destructive attacks. Given the high confidentiality impact and no requirement for authentication, attackers could exploit this vulnerability to gather intelligence or disrupt operations without detection. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased compliance risks and potential legal consequences if sensitive data is disclosed. Additionally, the vulnerability could undermine trust in managed services or network devices relying on QConvergeConsole, affecting operational continuity and reputation.

Mitigation Recommendations

To mitigate CVE-2025-6797, European organizations should take immediate and specific actions beyond generic advice: 1) Inventory and identify all instances of Marvell QConvergeConsole version 5.5.0.78 or earlier in their environment. 2) Restrict network access to the QConvergeConsole management interface by implementing network segmentation and firewall rules that limit access to trusted administrative hosts only. 3) Employ Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block path traversal patterns targeting the getFileUploadBytes method. 4) Monitor logs for unusual file access requests or anomalies indicative of exploitation attempts. 5) Engage with Marvell support channels to obtain patches or workarounds as soon as they become available, and prioritize timely deployment. 6) Consider temporary disabling or isolating vulnerable services if patching is not immediately possible. 7) Educate IT and security teams about the vulnerability specifics to improve detection and response capabilities. These targeted measures will reduce the attack surface and limit potential exploitation until a permanent fix is applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-06-27T14:57:30.394Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 686bdfa06f40f0eb72ea12af

Added to database: 7/7/2025, 2:54:24 PM

Last enriched: 7/7/2025, 3:13:07 PM

Last updated: 8/3/2025, 12:37:28 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats